- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-20-2019 12:17 AM
What is snatching in ACLs? what are other pros and cons of ACLs? what are High Security Settings?
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-20-2019 01:15 AM
Hello Mallikharjuna
1 .Snatching of ACL's:
There is no such thing like snatching. It simply means quickly secure sensitive information when a chance presents itself by configuring the ACL that may secure your data quickly.
No on ask this question in interview.
2. Pro's and Con's Of ACL
Pro's :
- ACL Securing Applications Against Unauthorized Users Objectives.
- ACL can restrict data if you are using Domain separation instance.
- ACL can secure sensitive data which we cannot do with client-side scripted security
- Access controls (ACLs) can seem very intimidating when you are trying to configure your instance security rule Field level restriction., table-level restriction.etc
- Once the system finds an ACL, the user must pass ALL THREE pieces of security on that ACL record: Roles, Conditions and scripts
- You can use this functionality for limiting the user to access your table or form based on the roles.
Con's :
-
It Slows Performance if you have multiple ACLS : Before query is better because the conditions/filters run the initial Database query level.
-
Nota great user interface experience: you don't get the security message in the bottom of the List /form which might confuse the user. here you can get list of UI errors that user may see: A list of common ACL rule errors and their solutions.
- However, issues can occur if one or more ACLs that are being evaluated at the same time do not have admin overrides checked.
- If you have columns that do not appear it is likely that there are ACLs on the referenced table that need to check a certain field in either the script field or the condition field. For example, if you had a field called "color" in your list that was dot walked from a table called "paint" that was granted read access by the company field of the paint table then you need to put the company field on your list prior to the dot walked color field so that the ACL could evaluate correctly.
3. High Security Settings:
- High Security Settings refer to several security options available in your instance.
- The High Security Settings module is activated with the High Security Settings plugin, which is active by default on new instances. If High Security Settings are not active on your instance, see Requesting High Security Settings activation.
-
There's a couple things that come in with High Security, the default deny ACL's is the main part of it, but it also includes some other functionality like elevated privileges
High Security Settings automatically activates the Contextual Security plugin if it is not already active. In addition, Platform Security Settings - High delivers the following settings and features in the context of increasing the security of your instance.
- Refer this docs: High Security Settings
Please mark as Correct Answer and Helpful, if applicable.
Thank You!
Abhishek Gardade
Hexaware Technologies Inc.
Abhishek Gardade

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-20-2019 12:51 AM
Hi,
Below link might help you :
ACL:
Regards,
Sanket
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎12-20-2019 01:15 AM
Hello Mallikharjuna
1 .Snatching of ACL's:
There is no such thing like snatching. It simply means quickly secure sensitive information when a chance presents itself by configuring the ACL that may secure your data quickly.
No on ask this question in interview.
2. Pro's and Con's Of ACL
Pro's :
- ACL Securing Applications Against Unauthorized Users Objectives.
- ACL can restrict data if you are using Domain separation instance.
- ACL can secure sensitive data which we cannot do with client-side scripted security
- Access controls (ACLs) can seem very intimidating when you are trying to configure your instance security rule Field level restriction., table-level restriction.etc
- Once the system finds an ACL, the user must pass ALL THREE pieces of security on that ACL record: Roles, Conditions and scripts
- You can use this functionality for limiting the user to access your table or form based on the roles.
Con's :
-
It Slows Performance if you have multiple ACLS : Before query is better because the conditions/filters run the initial Database query level.
-
Nota great user interface experience: you don't get the security message in the bottom of the List /form which might confuse the user. here you can get list of UI errors that user may see: A list of common ACL rule errors and their solutions.
- However, issues can occur if one or more ACLs that are being evaluated at the same time do not have admin overrides checked.
- If you have columns that do not appear it is likely that there are ACLs on the referenced table that need to check a certain field in either the script field or the condition field. For example, if you had a field called "color" in your list that was dot walked from a table called "paint" that was granted read access by the company field of the paint table then you need to put the company field on your list prior to the dot walked color field so that the ACL could evaluate correctly.
3. High Security Settings:
- High Security Settings refer to several security options available in your instance.
- The High Security Settings module is activated with the High Security Settings plugin, which is active by default on new instances. If High Security Settings are not active on your instance, see Requesting High Security Settings activation.
-
There's a couple things that come in with High Security, the default deny ACL's is the main part of it, but it also includes some other functionality like elevated privileges
High Security Settings automatically activates the Contextual Security plugin if it is not already active. In addition, Platform Security Settings - High delivers the following settings and features in the context of increasing the security of your instance.
- Refer this docs: High Security Settings
Please mark as Correct Answer and Helpful, if applicable.
Thank You!
Abhishek Gardade
Hexaware Technologies Inc.
Abhishek Gardade